Show simple item record

dc.contributor.authorZhang, Shengxia
dc.contributor.authorTian, Chengliang
dc.contributor.authorZhang, Hanlin
dc.contributor.authorYu, Jia
dc.contributor.authorLi, Fengjun
dc.date.accessioned2021-02-10T16:24:25Z
dc.date.available2021-02-10T16:24:25Z
dc.date.issued2019-04-26
dc.identifier.citationS. Zhang, C. Tian, H. Zhang, J. Yu and F. Li, "Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method," in IEEE Access, vol. 7, pp. 53823-53838, 2019, doi: 10.1109/ACCESS.2019.2913591.en_US
dc.identifier.urihttp://hdl.handle.net/1808/31422
dc.description.abstractWith the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from O(n 2.3728639 ) to O(n 2 ). Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms.en_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rightsCopyright 2019 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.en_US
dc.subjectCloud computingen_US
dc.subjectOutsourcing computationen_US
dc.subjectMatrix operationsen_US
dc.subjectPrivacyen_US
dc.subjectEfficiencyen_US
dc.titlePractical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Methoden_US
dc.typeArticleen_US
kusw.kuauthorLi, Fengjun
kusw.kudepartmentElectrical Engineering & Computer Scienceen_US
dc.identifier.doi10.1109/ACCESS.2019.2913591en_US
dc.identifier.orcidhttps://orcid.org/0000-0002-2474-910Xen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-0574-7803en_US
kusw.oaversionScholarly/refereed, publisher versionen_US
kusw.oapolicyThis item meets KU Open Access policy criteria.en_US
dc.rights.accessrightsopenAccessen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record